CN107480559B - A kind of safe storage system and method for the block chain from chain data - Google Patents

A kind of safe storage system and method for the block chain from chain data Download PDF

Info

Publication number
CN107480559B
CN107480559B CN201710743042.8A CN201710743042A CN107480559B CN 107480559 B CN107480559 B CN 107480559B CN 201710743042 A CN201710743042 A CN 201710743042A CN 107480559 B CN107480559 B CN 107480559B
Authority
CN
China
Prior art keywords
data
chain
authentication code
currently
chain data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710743042.8A
Other languages
Chinese (zh)
Other versions
CN107480559A (en
Inventor
王晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Star Tong Technology Co Ltd
Original Assignee
Beijing Star Tong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Star Tong Technology Co Ltd filed Critical Beijing Star Tong Technology Co Ltd
Priority to CN201710743042.8A priority Critical patent/CN107480559B/en
Publication of CN107480559A publication Critical patent/CN107480559A/en
Application granted granted Critical
Publication of CN107480559B publication Critical patent/CN107480559B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

Safe storage system and method the invention discloses a kind of block chain from chain data, this method is read currently from chain data, it, can be to all current data authentication codes from chain data authenticated from chain data according to the strategy generating that data authentication code generates after pre-processing;The correctness from chain data and corresponding data authentication code of write-in is verified, and correctly its backup buffers is written into from chain data in verifying;The set strategy that block chain main chain is written according to system, by backup buffers from block chain main chain is written after chain data processing.The present invention is solved by introducing third party's reliable memory from chain data loss problem, and can carry out authenticating this feature from chain data to all using the data authentication code currently from chain data, certification speed is improved while further decreasing from chain loss of data risk, improving the reliability and safety of block chain branch technology.

Description

A kind of safe storage system and method for the block chain from chain data
Technical field
The present invention relates to block chains, and in particular to a kind of safe storage system and method for the block chain from chain data.
Background technique
Block chain is that one kind is sequentially in time combined data block in a sequential manner and is associated with using cryptography method A kind of data structure of data block.It is verified using block linked data structure is total to storing data, using distributed node Algorithm is known to generate and guarantee the safety of data transmission and access with more new data, in the way of cryptography, using by automating The intelligent contract of scripted code composition programs and operation data, is a kind of completely new distributed basis framework and calculation paradigm, Having many characteristics, such as can not tamper, decentralization, anonymity and trackability.Currently, block chain has been widely used in gold Melt industry, and all shows wide application prospect in various fields.
However, needing the multiple nodes being connected to the network by P2P to safeguard jointly just using bit coin as the block chain network of representative It can guarantee data safety, the operation such as record, the storage of data in block chain can be into after needing multiple nodes to confirm jointly Row;Accordingly, it is considered to which the whole network common recognition is reached than data record, storage request to the bandwidth and data propagation rate of real network At the time of have certain delay, moreover, number of nodes is increasing as data payload constantly increases, this delay can constantly plus Greatly.
In order to solve above-mentioned delay issue, it has been proposed that side chain (Sidechain), lightning network (Lightening The methods of Network), main thought is: the block chain that the whole network majority node is reached common understanding is referred to as main chain;To be not more by the whole network Several sections of point common recognitions, but local nodes are known together, the block chain to be formed or isolated data block become branch;Mass data is first by branch It does from chain processing, to which after a certain period of time, these data or its cryptographic Hash are updated to main chain by unification.This block chain branch is (i.e. From chain storage, processing) technology, it is significant to the bottleneck for solving the storage and processing of block chain main chain, make the processing of block chain Speed increases substantially;But it is updated to the confirmation from chain data due to not obtaining all nodes of main chain not in time, exists and loses It goes wrong danger, suffers a loss so as to cause user.
Summary of the invention
The technical problem to be solved by the present invention is to do not obtained in block chain branch technology the confirmation of all nodes from chain There is risk of missing in data.
In order to solve the above-mentioned technical problem, the technical scheme adopted by the invention is that providing a kind of block chain from chain data Safe storage system, comprising:
Data authentication code generation module is read currently from chain data, after pre-processing, according to the raw plan of data authentication code Slightly, generation can be to all current data authentication codes from chain data authenticated from chain data;
Reliable memory module, verify data authentication code generation module write-in from chain data and corresponding data authentication code Correctness, and by verifying its backup buffers correctly is written from chain data;
The set tactful backup by the reliable memory module of block chain main chain is written according to system for data backup module Block chain main chain is written after necessity processing from chain data on buffer area.
In above system, the data authentication code generation module is according to secret protection needs, first to from chain data encryption, Data authentication code is generated from chain data to encrypted again;Key is by user management.
In above system, the data authentication code generation module is run by data owner, currently from chain data Mi's Data authentication code includes currently from chain data MiNon-public verify data authentication code and currently from chain data MiDisclosure can verify that Two kinds of data authentication code;
The data authentication code generation strategy of the data authentication code generation module is configured that
It is system configuration message authentication code function initial vector value MAC when initialization0, initial vector value MAC0It is solid for one The string of binary characters of fixed random length;
Call message authentication code function, with there is currently the last one output MAC value MACi-1As initial vector, The current from chain data M of data authentication code is generated with noiCorresponding character string exports corresponding MAC value MAC as inputi, As currently from chain data MiNon-public verify data authentication code, and stored, send MAC value MACiAnd corresponding work as It is preceding from chain data Mi
According to open proving period strategy, the MAC value MAC exported with the last oneiAs input, export currently from chain number According to MiDisclosure can verify that data authentication code, and store, send.
In above system, when generating i-th of non-public verify data authentication code, currently from chain data MiFor one or Several without generate data authentication code from chain data, by there is currently the last one output MAC value MACi-1As message The initial vector of authentication code function, with MiIt inputs message authentication code function and generates non-public verify data authentication code.
In above system, open proving period strategy includes:
Every is all generated in real time from chain data;
Only to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
Only in the system free time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
According to a certain period of time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data.
In above system, data authentication code generation module described in the reliable memory module verification write-in from chain data With the correctness of corresponding data authentication code, specifically:
It is the strategy generated according to above-mentioned data authentication code, verifies non-public verifying number of the system the last item from chain data According to the corresponding MAC value of authentication code and it is corresponding open can verify that whether data authentication code correct simultaneously, while it is correct when, judge this It is a bit correct from chain data;Otherwise, it is judged as incorrect.
In above system,
The reliable memory module carries out redundancy backup from chain data to write-in;
Additional the backing up from chain data to backup buffers of the data backup module.
In above system,
The memory block that the reliable memory module is responsible for being stored into from chain data is demarcated as backup buffers;
After block chain main chain is written from chain data in by the backup buffers in the data backup module, release is corresponded to Backup buffers.
In above system, when the set strategy of write-in block chain main chain includes periodical write-in block chain main chain or is idle Block chain main chain is written.
The present invention also provides a kind of method for secure storing of the block chain from chain data, comprising the following steps:
It reads currently from chain data, after pre-processing, according to data authentication code, raw strategy generating can be to all from chain The current data authentication code from chain data that data are authenticated;
The correctness from chain data and corresponding data authentication code of write-in is verified, and verifying is correctly write from chain data Enter its backup buffers;
The set strategy that block chain main chain is written according to system, by backup buffers from chain data after necessity processing Block chain main chain is written.
The present invention innovatively introduces third party's reliable memory and solves from chain data loss problem, and current using what is generated Data authentication code from chain data is authenticated to all from chain data, as long as in this way, verifying number of the last item from chain data According to the correctness of authentication code, it is ensured that the correctness of all data authentication codes before, not only further decreases and loses from chain data It goes wrong danger, and improves certification speed, enhance the reliability and safety of block chain branch technology.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram of safe storage system of the block chain from chain data provided by the invention;
Fig. 2 is in the present invention from chain data flow schematic diagram;
Fig. 3 is a kind of flow chart of method for secure storing of the block chain from chain data provided by the invention.
Specific embodiment
After the present invention is by generating data authentication code to data, it is stored in trusted third party storage together, then in a timing After phase, block chain processing speed bottleneck will solved simultaneously, solving number from chain data or its cryptographic Hash write-in block chain (main chain) According to the problem of loss.And in the present invention from chain data be not block chain data (distributed account book data) because they not by The most of nodes of the whole network approve, but open can verify that, anti-counterfeiting and can not support since data authentication code disclosed by the invention has The presence of Lai Xing and third party's reliable memory, to guarantee its safety, and when generating dispute, the present invention do not need by It is also capable of providing fact basis from chain data deposit main chain, and common block chain technology is merely able to certification and is present on main chain Data are capable of providing fact basis.
The present invention is described in detail with specific embodiment with reference to the accompanying drawings of the specification.
As shown in Figure 1, a kind of safe storage system of the block chain from chain data provided by the invention, comprising:
Data authentication code generation module 10 is read currently from chain data, is pre-processed and (is including but not limited to filled, saves Intermediate variable generates random key, encrypts, taking cryptographic Hash, generating check code or format conversion) after, it is raw according to data authentication code The current data authentication code from chain data at strategy generating;Currently the data authentication code from chain data can be to first from chain for this All data of data so far are authenticated.
Reliable memory module 20 verifies the correctness from chain data and corresponding data authentication code of write-in, and will verifying Its backup buffers correctly is written from chain data.
Data backup module 30, according to system be written block chain main chain it is set strategy (including but not limited to periodically or Block chain is written when idle), by (such as after doing Hash operation, being only written from chain data through necessity processing on backup buffers Cryptographic Hash, rather than data itself) block chain main chain is written afterwards;In the present invention, data backup module 30 can also be according to being System strategy, additionally backs up the data of backup buffers.
In the present invention, data authentication code generation module 10 is by data owner's (data where node) operation, currently from Chain data MiData authentication code include currently from chain data MiNon-public verify data authentication code and currently from chain data Mi's It is open to can verify that two kinds of data authentication code;The data authentication code generation strategy of data authentication code generation module 10 is configured that
Step 111, for data safety, when initialization, need for system configuration message authentication code (Message Authentication Code, abbreviation MAC) function initial vector value MAC0, initial vector value MAC0For a fixed times The string of binary characters for length of anticipating;
Step 112, call MAC function (such as HMAC, CMAC etc.), with there is currently the last one output MAC value MACi-1As initial vector, the current from chain data M of data authentication code is generated with noi(including one or several is not generated Data authentication code from chain data, at this point, by there is currently the last one output MAC value MACi-1As the first of MAC function Beginning vector, with MiInput MAC function and generate non-public verify data authentication code) character string conduct input, export corresponding MAC value MACi, as currently from chain data MiNon-public verify data authentication code, and stored, send MAC value MACiAnd it is corresponding It is current from chain data Mi, data authentication code reaction be data owner to initialization since all recognize from chain data Card, certification speed is fast but does not have open verifiability, as message authentication code (Message Authentication Code, MAC, for the generation of first data authentication code from chain data), incremental message authentication code (Incremental Message Authentication Code, for the generation of data authentication code of the later each item of Article 2 from chain data) etc., it reflects From first to a last finger print information from chain data;
Step 113 is to guarantee third party (reliable memory module 10) interests, and realization is called to account when dispute occurs, according to public affairs Proving period strategy is opened, the MAC value MAC exported with the last oneiAs input, export currently from chain data MiDisclosure can test It demonstrate,proves data authentication code (digital signature etc.), and stores, sends;The certification is generated by data owner, and speed is relatively slow but has public affairs Open verifiability i.e. non-repudiation function, the digital signature (Digital Signature) that is such as generated by sole user or by The asymmetric cryptographic algorithms such as the multi-signature (Multi-Signature) that multi-user (all owners of data) generates.
In the present invention, according to system needs, open proving period strategy includes but is not limited to following several:
1) every is all generated in real time from chain data;
2) only to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
3) only in the system free time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
4) according to a certain period of time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data.
In the present invention, data authentication code generation module 10, according to secret protection needs, can first to from chain data encryption, Key is voluntarily managed by user, not in third party's storage (reliable memory module 20) save, to encrypted from chain data Data authentication code is generated, to ensure the crypticity of data, it is ensured that its safety is generating non-public verify data authentication code at this time When, input is current encrypted data from chain data.
In the present invention, the correctness from chain data and data authentication code for verifying write-in is according to above-mentioned data authentication The strategy that code generates, is verified to all from chain data, i.e. verifying non-public data of the system the last item from chain data are recognized The corresponding MAC value of card code (in fact demonstrate all correctness from chain data but non-public can verify that) and it is corresponding openly can Whether verify data authentication code (open can verify that) correct simultaneously, at the same it is correct when, judge it is all from chain data for " correct ";It is no Then, it is judged as " incorrect ", it is of the invention as shown in Figure 3 from chain data flow.
The present invention due to several data authentication codes collective effect, can to initialization since all recognize from chain data Card takes into account authentication property, data processing speed and non repudiation, and calls to account when dispute occurs for data validity.
In the present invention, reliable memory module 20 need to provide highly reliable storage, and the mode of redundancy backup preservation can be used, into One step improves the reliability of storage.
In the present invention, reliable memory module 20 and data backup module 30 can access backup buffers;Reliably deposit Storing up module 20 to be responsible for one piece of memory block of calibration is backup buffers;Data backup module 30 is in by backup buffers from chain data After write-in block chain main chain is complete, corresponding backup buffers are discharged.
As shown in figure 3, the present invention also provides a kind of method for secure storing of the block chain from chain data, including following step It is rapid:
Step S11, it reads currently from chain data, pre-process (including but not limited to fill, save intermediate variable etc.) after, First can be worked as from chain data so far all from what chain data were authenticated by being generated according to data authentication code generation strategy The preceding data authentication code from chain data;
Step S12, verifying write-in the correctness from chain data and corresponding data authentication code, and will verifying correctly from Its backup buffers is written in chain data;
The set strategy of block chain main chain is written according to system by step S13, must by passing through on backup buffers from chain data Block chain main chain is written after handling.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (8)

1. a kind of safe storage system of the block chain from chain data characterized by comprising
Data authentication code generation module is read currently from chain data, raw according to data authentication code generation strategy after pre-processing At can be to all current data authentication codes from chain data authenticated from chain data;
Reliable memory module, verify data authentication code generation module write-in just from chain data and corresponding data authentication code True property, and correctly its backup buffers is written into from chain data in verifying;
Data backup module buffers the backup of the reliable memory module according to the set strategy that block chain main chain is written in system Block chain main chain is written after necessity processing from chain data in area;
The data authentication code generation module is run by data owner, currently from chain data MiData authentication code include current From chain data MiNon-public verify data authentication code and currently from chain data MiDisclosure can verify that two kinds of data authentication code;Institute The data authentication code generation strategy for stating data authentication code generation module is configured that
It is system configuration message authentication code function initial vector value MAC when initialization0, initial vector value MAC0It is fixed for one The string of binary characters of random length;
Call message authentication code function, with there is currently the last one output MAC value MACi-1As initial vector, not have Have and generates the current from chain data M of data authentication codeiCorresponding character string exports corresponding MAC value MAC as inputi, as Currently from chain data MiNon-public verify data authentication code, and stored, send MAC value MACiAnd it is corresponding currently from Chain data Mi
The MAC value MAC exported with the last oneiAs input, export currently from chain data MiDisclosure can verify that data authentication Code, and store, send;
When generating i-th of non-public verify data authentication code, currently from chain data MiData are not generated for one or several to recognize Demonstrate,prove code from chain data, by there is currently the last one output MAC value MACi-1As message authentication code function it is initial to Amount, with MiIt inputs message authentication code function and generates non-public verify data authentication code.
2. the system as claimed in claim 1, which is characterized in that the data authentication code generation module is according to secret protection need It wants, first generates data authentication code from chain data to from chain data encryption, then to encrypted;Key is by user management.
3. the system as claimed in claim 1, which is characterized in that disclosing proving period strategy includes:
Every is all generated in real time from chain data;
Only to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
Only in the system free time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data;
According to a certain period of time to the MAC value MAC currently finally exportediIt is corresponding to be generated from chain data.
4. the system as claimed in claim 1, which is characterized in that data authentication code described in the reliable memory module verification generates The correctness from chain data and corresponding data authentication code of module write-in, specifically:
It is the strategy generated according to above-mentioned data authentication code, verifying non-public verify data of the system the last item from chain data is recognized The corresponding MAC value of card code and it is corresponding it is open can verify that whether data authentication code correct simultaneously, while it is correct when, judge these from Chain data are correct;Otherwise, it is judged as incorrect.
5. the system as claimed in claim 1, which is characterized in that
The reliable memory module carries out redundancy backup from chain data to write-in;
Additional the backing up from chain data to backup buffers of the data backup module.
6. the system as claimed in claim 1, which is characterized in that
The memory block that the reliable memory module is responsible for being stored into from chain data is demarcated as backup buffers;
After block chain main chain is written from chain data in by the backup buffers in the data backup module, discharge corresponding standby Part buffer area.
7. the system as claimed in claim 1, which is characterized in that the set strategy of write-in block chain main chain includes periodically write-in Block chain main chain is written when block chain main chain or free time.
8. a kind of method for secure storing of the block chain from chain data, which comprises the following steps:
It reads currently from chain data, it, can be to all from chain data according to the generation of data authentication code generation strategy after pre-processing The current data authentication code from chain data authenticated;
The correctness from chain data and corresponding data authentication code of write-in is verified, and correctly it is written from chain data in verifying Backup buffers;
The set strategy that block chain main chain is written according to system, by being written after necessity processing from chain data on backup buffers Block chain main chain;
Wherein: currently from chain data MiData authentication code include currently from chain data MiNon-public verify data authentication code and Currently from chain data MiDisclosure can verify that two kinds of data authentication code;The data authentication code of the data authentication code generation module is raw It is configured that at strategy
It is system configuration message authentication code function initial vector value MAC when initialization0, initial vector value MAC0It is fixed for one The string of binary characters of random length;
Call message authentication code function, with there is currently the last one output MAC value MACi-1As initial vector, not have Have and generates the current from chain data M of data authentication codeiCorresponding character string exports corresponding MAC value MAC as inputi, as Currently from chain data MiNon-public verify data authentication code, and stored, send MAC value MACiAnd it is corresponding currently from Chain data Mi
The MAC value MAC exported with the last oneiAs input, export currently from chain data MiDisclosure can verify that data authentication Code, and store, send;
When generating i-th of non-public verify data authentication code, currently from chain data MiData are not generated for one or several to recognize Demonstrate,prove code from chain data, by there is currently the last one output MAC value MACi-1As message authentication code function it is initial to Amount, with MiIt inputs message authentication code function and generates non-public verify data authentication code.
CN201710743042.8A 2017-08-25 2017-08-25 A kind of safe storage system and method for the block chain from chain data Active CN107480559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710743042.8A CN107480559B (en) 2017-08-25 2017-08-25 A kind of safe storage system and method for the block chain from chain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710743042.8A CN107480559B (en) 2017-08-25 2017-08-25 A kind of safe storage system and method for the block chain from chain data

Publications (2)

Publication Number Publication Date
CN107480559A CN107480559A (en) 2017-12-15
CN107480559B true CN107480559B (en) 2019-08-20

Family

ID=60602586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710743042.8A Active CN107480559B (en) 2017-08-25 2017-08-25 A kind of safe storage system and method for the block chain from chain data

Country Status (1)

Country Link
CN (1) CN107480559B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171083B (en) * 2017-12-18 2020-02-07 深圳前海微众银行股份有限公司 Block chain trusted data management method, system and computer readable storage medium
CN108521418B (en) * 2018-04-04 2020-08-18 广州广电运通金融电子股份有限公司 Identity authentication method and system fusing block chain and biological feature recognition
CN108683655A (en) * 2018-05-08 2018-10-19 深圳万智联合科技有限公司 A kind of safe storage system of the block chain from chain data
CN108876572A (en) 2018-05-29 2018-11-23 阿里巴巴集团控股有限公司 The account checking method and device, electronic equipment of block chain transaction
CN109472600B (en) * 2018-11-20 2021-01-01 深圳市墨者安全科技有限公司 Block chain credibility verification method and device
CN109951389A (en) * 2019-03-06 2019-06-28 篱笆墙网络科技有限公司 Storage method of the block chain from chain data, device, equipment and storage medium
CN111291420B (en) * 2020-01-21 2022-11-11 国家市场监督管理总局信息中心 Distributed off-link data storage method based on block chain
CN111601288B (en) * 2020-06-30 2023-05-02 嘉应学院 Safe and efficient agricultural environment data communication method
CN112597544A (en) * 2020-12-24 2021-04-02 北京工业大学 Block chain-based industrial internet data security management system and method
CN112733211A (en) * 2021-01-15 2021-04-30 重庆邮电大学 Intelligent power grid data storage scheme based on block chain
CN112948083B (en) * 2021-02-25 2023-10-27 北京金山云网络技术有限公司 Data processing method and device and electronic equipment
CN113449032B (en) * 2021-06-03 2024-02-09 北京交通大学 System and method for interaction of block chain off-link data with verifiable data uplink

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106534317A (en) * 2016-11-17 2017-03-22 杭州云象网络技术有限公司 Disaster recovery cloud storage system construction method based on block chain technology
CN106649838A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Data transmission method, block chain node and distributed database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106452785A (en) * 2016-09-29 2017-02-22 财付通支付科技有限公司 Block chain network, branch node and block chain network application method
CN106534317A (en) * 2016-11-17 2017-03-22 杭州云象网络技术有限公司 Disaster recovery cloud storage system construction method based on block chain technology
CN106649838A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Data transmission method, block chain node and distributed database

Also Published As

Publication number Publication date
CN107480559A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107480559B (en) A kind of safe storage system and method for the block chain from chain data
CN106452785B (en) Block chain network, branch node and block chain network application method
CN106503098B (en) Block chain cloud service framework system built in Paas service layer
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
CN109670801B (en) Digital encryption money transfer method for block chain
US9537657B1 (en) Multipart authenticated encryption
US20190165947A1 (en) Signatures for near field communications
CN107566360B (en) A kind of generation method of data authentication code
CN108769061A (en) Login method, login validation method and corresponding device, electronic equipment
US11102006B2 (en) Blockchain intelligent security implementation
CN111723387A (en) Block chain-based data decryption method and device
CN113326525B (en) Data processing method and device based on intelligent contract
CN112035896B (en) Electronic contract evidence-storing system based on transaction mode
CN111211905A (en) Identity management method for Fabric alliance chain members based on certificate-free authentication
CN104717070B (en) A method of being associated with digital certificate using one-way Hash function
Liao et al. Toward authenticating the master in the modbus protocol
CN100476844C (en) Method for realizing binding function between electronic key and computer
CN109978543A (en) A kind of method, apparatus, electronic equipment and the storage medium of contract signature
CN109889489A (en) It is a kind of for carrying out the method and system of online or offline secure transmission to invoice data
CN101789939A (en) Effective realization method for credible OpenSSH
Dowling et al. Continuous authentication in secure messaging
CN106203579A (en) A kind of safe RFID label tag random number automatic update method
CN110492989A (en) The processing method of private key, the medium of access method and corresponding method, device
CN110417722A (en) A kind of business datum communication means, communication equipment and storage medium
CN111651740B (en) Trusted platform sharing system for distributed intelligent embedded system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant